1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
solniwko [45]
3 years ago
8

Match each item with a statement below.â

Computers and Technology
1 answer:
MakcuM [25]3 years ago
7 0

Answer:

a. Anycast Addresses

b. Broadcast domain

c. Classless Interdomain Routing (CIDR)

d. Extended Unique Identifier (EUI-64) interface ID

e. Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)

f. IP prefix

g. Loopback Address

h. Metric

i. Multicasting

j. Teredo

Explanation:

a. <u>Anycast Addresses</u>: An address type used in IPv6 to allow a one-to-many relationship between source and destination.

b. <u>Broadcast domain</u>: The bounds of a network that defines which devices must receive a packet that's broadcast by any other device.

c. <u>Classless Interdomain Routing (CIDR)</u>: A method of IP addressing in which the network and host IDs are determined by a prefix number that specifies how many bits of the IP address are network bits.

d. <u>Extended Unique Identifier (EUI-64) interface ID</u>: An auto configure IPv6 host address that uses the MAC address of the host plus an additional 16 bits.

e. <u>Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)</u>: An automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.

f. <u>IP prefix</u>: A value used to express how many bits of an IP address are network ID bits.

g. <u>Loopback Address</u>: An address that always refers to the local computer. The loop address is primarily 127.0.01.

h. <u>Metric</u>: A value assigned to the gateway based on the speed of the interface used to access the gateway.

i. <u>Multicasting</u>: A network communication in which a packet is addressed so that more than one destination can receive it

j. <u>Teredo</u>: An automatic IPv6-over-IPv4 tunneling protocol that solves the problem of 6to4's requirement of a public IPv4 address and the inability to traverse NAT routers.

You might be interested in
What is imagined risk
lara31 [8.8K]
Hello there!

Imagined Risks are simply 'imaginary' risks that are created out of doubt/fear.

Hope This Helps You!
Good Luck :)
3 0
4 years ago
Before you can use a navigation control, you must _____. A. configure the web.config B. configure the global.asax C. configure t
natita [175]

Answer:

C

Explanation:

6 0
3 years ago
Read 2 more answers
Sheila is using a process of saving files to her desktop and then renaming them. She is
inessss [21]

Answer: D

Use the internet to search for a new app to rename the folder.​

Explanation:

Rename function is used to change the name of the file or directory i.e. from old_name to new_name without changing the content present in the file. This function takes name of the file as its argument. There are many alternatives to this in which Sheila can found out through the internet.

5 0
3 years ago
Read 2 more answers
Which of the following describes a Trojan horse?
HACTEHA [7]

Answer:

the answer is

c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.

7 0
3 years ago
The PadRight function has two parameters: S (a string) and N (an int), and returns as its result the string S padded on the righ
oee [108]

Answer:

The following code is written in python programming language:

def PadRight(S,N):   #define user defined function

 if(len(S)<N):    # set if condition

   S=S.ljust(N)   #set the space to right

   return S       # return the result

 

def PadLeft(S,N):    #define user defined function

 if(len(S)<N):    # set if condition

   S=S.rjust(N)   # set the space to left

   return S       # return the result

'''calling the function'''

print(PadLeft("Frog",7))

print(PadRight("Frog",7))

Output:

      Frog

Frog

Explanation:

Here, we define a user defined function "PadRight()" and pass two arguments in its parameter "S", "N".

Then, set the if condition and pass condition "len(S)<N" then, if the condition is true then the code inside the if condition set the space to right then, return the output.

After that, we again define a user defined function "PadLeft()" and pass two arguments in its parameter "S", "N".

Then, set the if condition and pass condition "len(S)<N" then, if the condition is true then the code inside the if condition set the space to right then, return the output.

6 0
3 years ago
Other questions:
  • What these large numbers in unemployment could mean long term for America?
    6·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • . Some countries lack physical resources, like computers or network connections, making it difficult to keep up with the technol
    8·2 answers
  • What is 36 Denary in Binary?? PLEASE ANSWER I WILL GIVE U BRAINLY!!
    9·2 answers
  • True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
    10·1 answer
  • why does planets orbit the sun? asap i give brainlist i know it on that subject i dont know what else goes with it
    10·1 answer
  • Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a d
    8·1 answer
  • THis took FOREVER! please go check it out, if you have seen my demo to this game, you will like the full version! https://scratc
    9·2 answers
  • The purpose of an Internet _____ is to receive packets and send them along towards their final destination.
    8·1 answer
  • Compare and discuss between electromechanical and electronic era of computer​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!